Sciweavers

47 search results - page 8 / 10
» Limited Verifier Signature from Bilinear Pairings
Sort
View
LPAR
2007
Springer
13 years 12 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 5 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
BIB
2007
59views more  BIB 2007»
13 years 5 months ago
Statistically designing microarrays and microarray experiments to enhance sensitivity and specificity
Gene expression signatures from microarray experiments promise to provide important prognostic tools for predicting disease outcome or response to treatment. A number of microarra...
Jason C. Hsu, Jane Chang, Tao Wang, Eiríkur...
ICBA
2004
Springer
144views Biometrics» more  ICBA 2004»
13 years 11 months ago
Improving Iris Recognition Accuracy via Cascaded Classifiers
As a reliable approach to human identification, iris recognition has received increasing attention in recent years. In the literature of iris recognition, local feature of image de...
Zhenan Sun, Yunhong Wang, Tieniu Tan, Jiali Cui
ISCI
2010
146views more  ISCI 2010»
13 years 3 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...